Watch this video on YouTube
To manage their own encryption keys for encrypting data on Cloud Storage, a customer's internal security team opts to use customer-supplied encryption keys (CSEK). How should the team proceed with this task?